1/* $OpenLDAP$ */ 2/* This work is part of OpenLDAP Software <http://www.openldap.org/>. 3 * 4 * Copyright 1999-2011 The OpenLDAP Foundation. 5 * Portions Copyright 1999 Dmitry Kovalev. 6 * Portions Copyright 2002 Pierangelo Masarati. 7 * Portions Copyright 2004 Mark Adamson. 8 * All rights reserved. 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted only as authorized by the OpenLDAP 12 * Public License. 13 * 14 * A copy of this license is available in the file LICENSE in the 15 * top-level directory of the distribution or, alternatively, at 16 * <http://www.OpenLDAP.org/license.html>. 17 */ 18/* ACKNOWLEDGEMENTS: 19 * This work was initially developed by Dmitry Kovalev for inclusion 20 * by OpenLDAP Software. Additional significant contributors include 21 * Pierangelo Masarati and Mark Adamson. 22 */ 23 24#include "portable.h" 25 26#include <stdio.h> 27#include <sys/types.h> 28#include "ac/string.h" 29 30#include "lutil.h" 31#include "slap.h" 32#include "proto-sql.h" 33 34#ifdef BACKSQL_ARBITRARY_KEY 35struct berval backsql_baseObject_bv = BER_BVC( BACKSQL_BASEOBJECT_IDSTR ); 36#endif /* BACKSQL_ARBITRARY_KEY */ 37 38backsql_entryID * 39backsql_entryID_dup( backsql_entryID *src, void *ctx ) 40{ 41 backsql_entryID *dst; 42 43 if ( src == NULL ) return NULL; 44 45 dst = slap_sl_calloc( 1, sizeof( backsql_entryID ), ctx ); 46 ber_dupbv_x( &dst->eid_ndn, &src->eid_ndn, ctx ); 47 if ( src->eid_dn.bv_val == src->eid_ndn.bv_val ) { 48 dst->eid_dn = dst->eid_ndn; 49 } else { 50 ber_dupbv_x( &dst->eid_dn, &src->eid_dn, ctx ); 51 } 52 53#ifdef BACKSQL_ARBITRARY_KEY 54 ber_dupbv_x( &dst->eid_id, &src->eid_id, ctx ); 55 ber_dupbv_x( &dst->eid_keyval, &src->eid_keyval, ctx ); 56#else /* ! BACKSQL_ARBITRARY_KEY */ 57 dst->eid_id = src->eid_id; 58 dst->eid_keyval = src->eid_keyval; 59#endif /* ! BACKSQL_ARBITRARY_KEY */ 60 61 dst->eid_oc = src->eid_oc; 62 dst->eid_oc_id = src->eid_oc_id; 63 64 return dst; 65} 66 67backsql_entryID * 68backsql_free_entryID( backsql_entryID *id, int freeit, void *ctx ) 69{ 70 backsql_entryID *next; 71 72 assert( id != NULL ); 73 74 next = id->eid_next; 75 76 if ( !BER_BVISNULL( &id->eid_ndn ) ) { 77 if ( !BER_BVISNULL( &id->eid_dn ) 78 && id->eid_dn.bv_val != id->eid_ndn.bv_val ) 79 { 80 slap_sl_free( id->eid_dn.bv_val, ctx ); 81 BER_BVZERO( &id->eid_dn ); 82 } 83 84 slap_sl_free( id->eid_ndn.bv_val, ctx ); 85 BER_BVZERO( &id->eid_ndn ); 86 } 87 88#ifdef BACKSQL_ARBITRARY_KEY 89 if ( !BER_BVISNULL( &id->eid_id ) ) { 90 slap_sl_free( id->eid_id.bv_val, ctx ); 91 BER_BVZERO( &id->eid_id ); 92 } 93 94 if ( !BER_BVISNULL( &id->eid_keyval ) ) { 95 slap_sl_free( id->eid_keyval.bv_val, ctx ); 96 BER_BVZERO( &id->eid_keyval ); 97 } 98#endif /* BACKSQL_ARBITRARY_KEY */ 99 100 if ( freeit ) { 101 slap_sl_free( id, ctx ); 102 } 103 104 return next; 105} 106 107/* 108 * NOTE: the dn must be normalized 109 */ 110int 111backsql_dn2id( 112 Operation *op, 113 SlapReply *rs, 114 SQLHDBC dbh, 115 struct berval *ndn, 116 backsql_entryID *id, 117 int matched, 118 int muck ) 119{ 120 backsql_info *bi = op->o_bd->be_private; 121 SQLHSTMT sth = SQL_NULL_HSTMT; 122 BACKSQL_ROW_NTS row = { 0 }; 123 RETCODE rc; 124 int res; 125 struct berval realndn = BER_BVNULL; 126 127 /* TimesTen */ 128 char upperdn[ BACKSQL_MAX_DN_LEN + 1 ]; 129 struct berval tbbDN; 130 int i, j; 131 132 /* 133 * NOTE: id can be NULL; in this case, the function 134 * simply checks whether the DN can be successfully 135 * turned into an ID, returning LDAP_SUCCESS for 136 * positive cases, or the most appropriate error 137 */ 138 139 Debug( LDAP_DEBUG_TRACE, "==>backsql_dn2id(\"%s\")%s%s\n", 140 ndn->bv_val, id == NULL ? " (no ID expected)" : "", 141 matched ? " matched expected" : "" ); 142 143 if ( id ) { 144 /* NOTE: trap inconsistencies */ 145 assert( BER_BVISNULL( &id->eid_ndn ) ); 146 } 147 148 if ( ndn->bv_len > BACKSQL_MAX_DN_LEN ) { 149 Debug( LDAP_DEBUG_TRACE, 150 " backsql_dn2id(\"%s\"): DN length=%ld " 151 "exceeds max DN length %d:\n", 152 ndn->bv_val, ndn->bv_len, BACKSQL_MAX_DN_LEN ); 153 return LDAP_OTHER; 154 } 155 156 /* return baseObject if available and matches */ 157 /* FIXME: if ndn is already mucked, we cannot check this */ 158 if ( bi->sql_baseObject != NULL && 159 dn_match( ndn, &bi->sql_baseObject->e_nname ) ) 160 { 161 if ( id != NULL ) { 162#ifdef BACKSQL_ARBITRARY_KEY 163 ber_dupbv_x( &id->eid_id, &backsql_baseObject_bv, 164 op->o_tmpmemctx ); 165 ber_dupbv_x( &id->eid_keyval, &backsql_baseObject_bv, 166 op->o_tmpmemctx ); 167#else /* ! BACKSQL_ARBITRARY_KEY */ 168 id->eid_id = BACKSQL_BASEOBJECT_ID; 169 id->eid_keyval = BACKSQL_BASEOBJECT_KEYVAL; 170#endif /* ! BACKSQL_ARBITRARY_KEY */ 171 id->eid_oc_id = BACKSQL_BASEOBJECT_OC; 172 173 ber_dupbv_x( &id->eid_ndn, &bi->sql_baseObject->e_nname, 174 op->o_tmpmemctx ); 175 ber_dupbv_x( &id->eid_dn, &bi->sql_baseObject->e_name, 176 op->o_tmpmemctx ); 177 178 id->eid_next = NULL; 179 } 180 181 return LDAP_SUCCESS; 182 } 183 184 /* begin TimesTen */ 185 assert( bi->sql_id_query != NULL ); 186 Debug( LDAP_DEBUG_TRACE, " backsql_dn2id(\"%s\"): id_query \"%s\"\n", 187 ndn->bv_val, bi->sql_id_query, 0 ); 188 rc = backsql_Prepare( dbh, &sth, bi->sql_id_query, 0 ); 189 if ( rc != SQL_SUCCESS ) { 190 Debug( LDAP_DEBUG_TRACE, 191 " backsql_dn2id(\"%s\"): " 192 "error preparing SQL:\n %s", 193 ndn->bv_val, bi->sql_id_query, 0 ); 194 backsql_PrintErrors( bi->sql_db_env, dbh, sth, rc ); 195 res = LDAP_OTHER; 196 goto done; 197 } 198 199 realndn = *ndn; 200 if ( muck ) { 201 if ( backsql_api_dn2odbc( op, rs, &realndn ) ) { 202 Debug( LDAP_DEBUG_TRACE, " backsql_dn2id(\"%s\"): " 203 "backsql_api_dn2odbc(\"%s\") failed\n", 204 ndn->bv_val, realndn.bv_val, 0 ); 205 res = LDAP_OTHER; 206 goto done; 207 } 208 } 209 210 if ( BACKSQL_HAS_LDAPINFO_DN_RU( bi ) ) { 211 /* 212 * Prepare an upper cased, byte reversed version 213 * that can be searched using indexes 214 */ 215 216 for ( i = 0, j = realndn.bv_len - 1; realndn.bv_val[ i ]; i++, j--) 217 { 218 upperdn[ i ] = realndn.bv_val[ j ]; 219 } 220 upperdn[ i ] = '\0'; 221 ldap_pvt_str2upper( upperdn ); 222 223 Debug( LDAP_DEBUG_TRACE, " backsql_dn2id(\"%s\"): " 224 "upperdn=\"%s\"\n", 225 ndn->bv_val, upperdn, 0 ); 226 ber_str2bv( upperdn, 0, 0, &tbbDN ); 227 228 } else { 229 if ( BACKSQL_USE_REVERSE_DN( bi ) ) { 230 AC_MEMCPY( upperdn, realndn.bv_val, realndn.bv_len + 1 ); 231 ldap_pvt_str2upper( upperdn ); 232 Debug( LDAP_DEBUG_TRACE, 233 " backsql_dn2id(\"%s\"): " 234 "upperdn=\"%s\"\n", 235 ndn->bv_val, upperdn, 0 ); 236 ber_str2bv( upperdn, 0, 0, &tbbDN ); 237 238 } else { 239 tbbDN = realndn; 240 } 241 } 242 243 rc = backsql_BindParamBerVal( sth, 1, SQL_PARAM_INPUT, &tbbDN ); 244 if ( rc != SQL_SUCCESS) { 245 /* end TimesTen */ 246 Debug( LDAP_DEBUG_TRACE, " backsql_dn2id(\"%s\"): " 247 "error binding dn=\"%s\" parameter:\n", 248 ndn->bv_val, tbbDN.bv_val, 0 ); 249 backsql_PrintErrors( bi->sql_db_env, dbh, sth, rc ); 250 res = LDAP_OTHER; 251 goto done; 252 } 253 254 rc = SQLExecute( sth ); 255 if ( rc != SQL_SUCCESS ) { 256 Debug( LDAP_DEBUG_TRACE, " backsql_dn2id(\"%s\"): " 257 "error executing query (\"%s\", \"%s\"):\n", 258 ndn->bv_val, bi->sql_id_query, tbbDN.bv_val ); 259 backsql_PrintErrors( bi->sql_db_env, dbh, sth, rc ); 260 res = LDAP_OTHER; 261 goto done; 262 } 263 264 backsql_BindRowAsStrings_x( sth, &row, op->o_tmpmemctx ); 265 rc = SQLFetch( sth ); 266 if ( BACKSQL_SUCCESS( rc ) ) { 267 char buf[ SLAP_TEXT_BUFLEN ]; 268 269#ifdef LDAP_DEBUG 270 snprintf( buf, sizeof(buf), 271 "id=%s keyval=%s oc_id=%s dn=%s", 272 row.cols[ 0 ], row.cols[ 1 ], 273 row.cols[ 2 ], row.cols[ 3 ] ); 274 Debug( LDAP_DEBUG_TRACE, 275 " backsql_dn2id(\"%s\"): %s\n", 276 ndn->bv_val, buf, 0 ); 277#endif /* LDAP_DEBUG */ 278 279 res = LDAP_SUCCESS; 280 if ( id != NULL ) { 281 struct berval dn; 282 283 id->eid_next = NULL; 284 285#ifdef BACKSQL_ARBITRARY_KEY 286 ber_str2bv_x( row.cols[ 0 ], 0, 1, &id->eid_id, 287 op->o_tmpmemctx ); 288 ber_str2bv_x( row.cols[ 1 ], 0, 1, &id->eid_keyval, 289 op->o_tmpmemctx ); 290#else /* ! BACKSQL_ARBITRARY_KEY */ 291 if ( BACKSQL_STR2ID( &id->eid_id, row.cols[ 0 ], 0 ) != 0 ) { 292 res = LDAP_OTHER; 293 goto done; 294 } 295 if ( BACKSQL_STR2ID( &id->eid_keyval, row.cols[ 1 ], 0 ) != 0 ) { 296 res = LDAP_OTHER; 297 goto done; 298 } 299#endif /* ! BACKSQL_ARBITRARY_KEY */ 300 if ( BACKSQL_STR2ID( &id->eid_oc_id, row.cols[ 2 ], 0 ) != 0 ) { 301 res = LDAP_OTHER; 302 goto done; 303 } 304 305 ber_str2bv( row.cols[ 3 ], 0, 0, &dn ); 306 307 if ( backsql_api_odbc2dn( op, rs, &dn ) ) { 308 res = LDAP_OTHER; 309 goto done; 310 } 311 312 res = dnPrettyNormal( NULL, &dn, 313 &id->eid_dn, &id->eid_ndn, 314 op->o_tmpmemctx ); 315 if ( res != LDAP_SUCCESS ) { 316 Debug( LDAP_DEBUG_TRACE, 317 " backsql_dn2id(\"%s\"): " 318 "dnPrettyNormal failed (%d: %s)\n", 319 realndn.bv_val, res, 320 ldap_err2string( res ) ); 321 322 /* cleanup... */ 323 (void)backsql_free_entryID( id, 0, op->o_tmpmemctx ); 324 } 325 326 if ( dn.bv_val != row.cols[ 3 ] ) { 327 free( dn.bv_val ); 328 } 329 } 330 331 } else { 332 res = LDAP_NO_SUCH_OBJECT; 333 if ( matched ) { 334 struct berval pdn = *ndn; 335 336 /* 337 * Look for matched 338 */ 339 rs->sr_matched = NULL; 340 while ( !be_issuffix( op->o_bd, &pdn ) ) { 341 char *matchedDN = NULL; 342 343 dnParent( &pdn, &pdn ); 344 345 /* 346 * Empty DN ("") defaults to LDAP_SUCCESS 347 */ 348 rs->sr_err = backsql_dn2id( op, rs, dbh, &pdn, id, 0, 1 ); 349 switch ( rs->sr_err ) { 350 case LDAP_NO_SUCH_OBJECT: 351 /* try another one */ 352 break; 353 354 case LDAP_SUCCESS: 355 matchedDN = pdn.bv_val; 356 /* fail over to next case */ 357 358 default: 359 rs->sr_err = LDAP_NO_SUCH_OBJECT; 360 rs->sr_matched = matchedDN; 361 goto done; 362 } 363 } 364 } 365 } 366 367done:; 368 backsql_FreeRow_x( &row, op->o_tmpmemctx ); 369 370 Debug( LDAP_DEBUG_TRACE, 371 "<==backsql_dn2id(\"%s\"): err=%d\n", 372 ndn->bv_val, res, 0 ); 373 if ( sth != SQL_NULL_HSTMT ) { 374 SQLFreeStmt( sth, SQL_DROP ); 375 } 376 377 if ( !BER_BVISNULL( &realndn ) && realndn.bv_val != ndn->bv_val ) { 378 ch_free( realndn.bv_val ); 379 } 380 381 return res; 382} 383 384int 385backsql_count_children( 386 Operation *op, 387 SQLHDBC dbh, 388 struct berval *dn, 389 unsigned long *nchildren ) 390{ 391 backsql_info *bi = (backsql_info *)op->o_bd->be_private; 392 SQLHSTMT sth = SQL_NULL_HSTMT; 393 BACKSQL_ROW_NTS row; 394 RETCODE rc; 395 int res = LDAP_SUCCESS; 396 397 Debug( LDAP_DEBUG_TRACE, "==>backsql_count_children(): dn=\"%s\"\n", 398 dn->bv_val, 0, 0 ); 399 400 if ( dn->bv_len > BACKSQL_MAX_DN_LEN ) { 401 Debug( LDAP_DEBUG_TRACE, 402 "backsql_count_children(): DN \"%s\" (%ld bytes) " 403 "exceeds max DN length (%d):\n", 404 dn->bv_val, dn->bv_len, BACKSQL_MAX_DN_LEN ); 405 return LDAP_OTHER; 406 } 407 408 /* begin TimesTen */ 409 assert( bi->sql_has_children_query != NULL ); 410 Debug(LDAP_DEBUG_TRACE, "children id query \"%s\"\n", 411 bi->sql_has_children_query, 0, 0); 412 rc = backsql_Prepare( dbh, &sth, bi->sql_has_children_query, 0 ); 413 if ( rc != SQL_SUCCESS ) { 414 Debug( LDAP_DEBUG_TRACE, 415 "backsql_count_children(): error preparing SQL:\n%s", 416 bi->sql_has_children_query, 0, 0); 417 backsql_PrintErrors( bi->sql_db_env, dbh, sth, rc ); 418 SQLFreeStmt( sth, SQL_DROP ); 419 return LDAP_OTHER; 420 } 421 422 rc = backsql_BindParamBerVal( sth, 1, SQL_PARAM_INPUT, dn ); 423 if ( rc != SQL_SUCCESS) { 424 /* end TimesTen */ 425 Debug( LDAP_DEBUG_TRACE, "backsql_count_children(): " 426 "error binding dn=\"%s\" parameter:\n", 427 dn->bv_val, 0, 0 ); 428 backsql_PrintErrors( bi->sql_db_env, dbh, sth, rc ); 429 SQLFreeStmt( sth, SQL_DROP ); 430 return LDAP_OTHER; 431 } 432 433 rc = SQLExecute( sth ); 434 if ( rc != SQL_SUCCESS ) { 435 Debug( LDAP_DEBUG_TRACE, "backsql_count_children(): " 436 "error executing query (\"%s\", \"%s\"):\n", 437 bi->sql_has_children_query, dn->bv_val, 0 ); 438 backsql_PrintErrors( bi->sql_db_env, dbh, sth, rc ); 439 SQLFreeStmt( sth, SQL_DROP ); 440 return LDAP_OTHER; 441 } 442 443 backsql_BindRowAsStrings_x( sth, &row, op->o_tmpmemctx ); 444 445 rc = SQLFetch( sth ); 446 if ( BACKSQL_SUCCESS( rc ) ) { 447 char *end; 448 449 *nchildren = strtol( row.cols[ 0 ], &end, 0 ); 450 if ( end == row.cols[ 0 ] ) { 451 res = LDAP_OTHER; 452 453 } else { 454 switch ( end[ 0 ] ) { 455 case '\0': 456 break; 457 458 case '.': { 459 unsigned long ul; 460 461 /* FIXME: braindead RDBMSes return 462 * a fractional number from COUNT! 463 */ 464 if ( lutil_atoul( &ul, end + 1 ) != 0 || ul != 0 ) { 465 res = LDAP_OTHER; 466 } 467 } break; 468 469 default: 470 res = LDAP_OTHER; 471 } 472 } 473 474 } else { 475 res = LDAP_OTHER; 476 } 477 backsql_FreeRow_x( &row, op->o_tmpmemctx ); 478 479 SQLFreeStmt( sth, SQL_DROP ); 480 481 Debug( LDAP_DEBUG_TRACE, "<==backsql_count_children(): %lu\n", 482 *nchildren, 0, 0 ); 483 484 return res; 485} 486 487int 488backsql_has_children( 489 Operation *op, 490 SQLHDBC dbh, 491 struct berval *dn ) 492{ 493 unsigned long nchildren; 494 int rc; 495 496 rc = backsql_count_children( op, dbh, dn, &nchildren ); 497 498 if ( rc == LDAP_SUCCESS ) { 499 return nchildren > 0 ? LDAP_COMPARE_TRUE : LDAP_COMPARE_FALSE; 500 } 501 502 return rc; 503} 504 505static int 506backsql_get_attr_vals( void *v_at, void *v_bsi ) 507{ 508 backsql_at_map_rec *at = v_at; 509 backsql_srch_info *bsi = v_bsi; 510 backsql_info *bi; 511 RETCODE rc; 512 SQLHSTMT sth = SQL_NULL_HSTMT; 513 BACKSQL_ROW_NTS row; 514 unsigned long i, 515 k = 0, 516 oldcount = 0, 517 res = 0; 518#ifdef BACKSQL_COUNTQUERY 519 unsigned count, 520 j, 521 append = 0; 522 SQLLEN countsize = sizeof( count ); 523 Attribute *attr = NULL; 524 525 slap_mr_normalize_func *normfunc = NULL; 526#endif /* BACKSQL_COUNTQUERY */ 527#ifdef BACKSQL_PRETTY_VALIDATE 528 slap_syntax_validate_func *validate = NULL; 529 slap_syntax_transform_func *pretty = NULL; 530#endif /* BACKSQL_PRETTY_VALIDATE */ 531 532 assert( at != NULL ); 533 assert( bsi != NULL ); 534 Debug( LDAP_DEBUG_TRACE, "==>backsql_get_attr_vals(): " 535 "oc=\"%s\" attr=\"%s\" keyval=" BACKSQL_IDFMT "\n", 536 BACKSQL_OC_NAME( bsi->bsi_oc ), at->bam_ad->ad_cname.bv_val, 537 BACKSQL_IDARG(bsi->bsi_c_eid->eid_keyval) ); 538 539 bi = (backsql_info *)bsi->bsi_op->o_bd->be_private; 540 541#ifdef BACKSQL_PRETTY_VALIDATE 542 validate = at->bam_true_ad->ad_type->sat_syntax->ssyn_validate; 543 pretty = at->bam_true_ad->ad_type->sat_syntax->ssyn_pretty; 544 545 if ( validate == NULL && pretty == NULL ) { 546 return 1; 547 } 548#endif /* BACKSQL_PRETTY_VALIDATE */ 549 550#ifdef BACKSQL_COUNTQUERY 551 if ( at->bam_true_ad->ad_type->sat_equality ) { 552 normfunc = at->bam_true_ad->ad_type->sat_equality->smr_normalize; 553 } 554 555 /* Count how many rows will be returned. This avoids memory 556 * fragmentation that can result from loading the values in 557 * one by one and using realloc() 558 */ 559 rc = backsql_Prepare( bsi->bsi_dbh, &sth, at->bam_countquery, 0 ); 560 if ( rc != SQL_SUCCESS ) { 561 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): " 562 "error preparing count query: %s\n", 563 at->bam_countquery, 0, 0 ); 564 backsql_PrintErrors( bi->sql_db_env, bsi->bsi_dbh, sth, rc ); 565 return 1; 566 } 567 568 rc = backsql_BindParamID( sth, 1, SQL_PARAM_INPUT, 569 &bsi->bsi_c_eid->eid_keyval ); 570 if ( rc != SQL_SUCCESS ) { 571 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): " 572 "error binding key value parameter\n", 0, 0, 0 ); 573 SQLFreeStmt( sth, SQL_DROP ); 574 return 1; 575 } 576 577 rc = SQLExecute( sth ); 578 if ( ! BACKSQL_SUCCESS( rc ) ) { 579 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): " 580 "error executing attribute count query '%s'\n", 581 at->bam_countquery, 0, 0 ); 582 backsql_PrintErrors( bi->sql_db_env, bsi->bsi_dbh, sth, rc ); 583 SQLFreeStmt( sth, SQL_DROP ); 584 return 1; 585 } 586 587 SQLBindCol( sth, (SQLUSMALLINT)1, SQL_C_LONG, 588 (SQLPOINTER)&count, 589 (SQLINTEGER)sizeof( count ), 590 &countsize ); 591 592 rc = SQLFetch( sth ); 593 if ( rc != SQL_SUCCESS ) { 594 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): " 595 "error fetch results of count query: %s\n", 596 at->bam_countquery, 0, 0 ); 597 backsql_PrintErrors( bi->sql_db_env, bsi->bsi_dbh, sth, rc ); 598 SQLFreeStmt( sth, SQL_DROP ); 599 return 1; 600 } 601 602 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): " 603 "number of values in query: %u\n", count, 0, 0 ); 604 SQLFreeStmt( sth, SQL_DROP ); 605 if ( count == 0 ) { 606 return 1; 607 } 608 609 attr = attr_find( bsi->bsi_e->e_attrs, at->bam_true_ad ); 610 if ( attr != NULL ) { 611 BerVarray tmp; 612 613 if ( attr->a_vals != NULL ) { 614 oldcount = attr->a_numvals; 615 } 616 617 tmp = ch_realloc( attr->a_vals, ( oldcount + count + 1 ) * sizeof( struct berval ) ); 618 if ( tmp == NULL ) { 619 return 1; 620 } 621 attr->a_vals = tmp; 622 memset( &attr->a_vals[ oldcount ], 0, ( count + 1 ) * sizeof( struct berval ) ); 623 624 if ( normfunc ) { 625 tmp = ch_realloc( attr->a_nvals, ( oldcount + count + 1 ) * sizeof( struct berval ) ); 626 if ( tmp == NULL ) { 627 return 1; 628 } 629 attr->a_nvals = tmp; 630 memset( &attr->a_nvals[ oldcount ], 0, ( count + 1 ) * sizeof( struct berval ) ); 631 632 } else { 633 attr->a_nvals = attr->a_vals; 634 } 635 attr->a_numvals += count; 636 637 } else { 638 append = 1; 639 640 /* Make space for the array of values */ 641 attr = attr_alloc( at->bam_true_ad ); 642 attr->a_numvals = count; 643 attr->a_vals = ch_calloc( count + 1, sizeof( struct berval ) ); 644 if ( attr->a_vals == NULL ) { 645 Debug( LDAP_DEBUG_TRACE, "Out of memory!\n", 0,0,0 ); 646 ch_free( attr ); 647 return 1; 648 } 649 if ( normfunc ) { 650 attr->a_nvals = ch_calloc( count + 1, sizeof( struct berval ) ); 651 if ( attr->a_nvals == NULL ) { 652 ch_free( attr->a_vals ); 653 ch_free( attr ); 654 return 1; 655 656 } 657 658 } else { 659 attr->a_nvals = attr->a_vals; 660 } 661 } 662#endif /* BACKSQL_COUNTQUERY */ 663 664 rc = backsql_Prepare( bsi->bsi_dbh, &sth, at->bam_query, 0 ); 665 if ( rc != SQL_SUCCESS ) { 666 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): " 667 "error preparing query: %s\n", at->bam_query, 0, 0 ); 668 backsql_PrintErrors( bi->sql_db_env, bsi->bsi_dbh, sth, rc ); 669#ifdef BACKSQL_COUNTQUERY 670 if ( append ) { 671 attr_free( attr ); 672 } 673#endif /* BACKSQL_COUNTQUERY */ 674 return 1; 675 } 676 677 rc = backsql_BindParamID( sth, 1, SQL_PARAM_INPUT, 678 &bsi->bsi_c_eid->eid_keyval ); 679 if ( rc != SQL_SUCCESS ) { 680 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): " 681 "error binding key value parameter\n", 0, 0, 0 ); 682#ifdef BACKSQL_COUNTQUERY 683 if ( append ) { 684 attr_free( attr ); 685 } 686#endif /* BACKSQL_COUNTQUERY */ 687 return 1; 688 } 689 690#ifdef BACKSQL_TRACE 691 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): " 692 "query=\"%s\" keyval=" BACKSQL_IDFMT "\n", at->bam_query, 693 BACKSQL_IDARG(bsi->bsi_c_eid->eid_keyval), 0 ); 694#endif /* BACKSQL_TRACE */ 695 696 rc = SQLExecute( sth ); 697 if ( ! BACKSQL_SUCCESS( rc ) ) { 698 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): " 699 "error executing attribute query \"%s\"\n", 700 at->bam_query, 0, 0 ); 701 backsql_PrintErrors( bi->sql_db_env, bsi->bsi_dbh, sth, rc ); 702 SQLFreeStmt( sth, SQL_DROP ); 703#ifdef BACKSQL_COUNTQUERY 704 if ( append ) { 705 attr_free( attr ); 706 } 707#endif /* BACKSQL_COUNTQUERY */ 708 return 1; 709 } 710 711 backsql_BindRowAsStrings_x( sth, &row, bsi->bsi_op->o_tmpmemctx ); 712#ifdef BACKSQL_COUNTQUERY 713 j = oldcount; 714#endif /* BACKSQL_COUNTQUERY */ 715 for ( rc = SQLFetch( sth ), k = 0; 716 BACKSQL_SUCCESS( rc ); 717 rc = SQLFetch( sth ), k++ ) 718 { 719 for ( i = 0; i < (unsigned long)row.ncols; i++ ) { 720 721 if ( row.value_len[ i ] > 0 ) { 722 struct berval bv; 723 int retval; 724#ifdef BACKSQL_TRACE 725 AttributeDescription *ad = NULL; 726 const char *text; 727 728 retval = slap_bv2ad( &row.col_names[ i ], &ad, &text ); 729 if ( retval != LDAP_SUCCESS ) { 730 Debug( LDAP_DEBUG_ANY, 731 "==>backsql_get_attr_vals(\"%s\"): " 732 "unable to find AttributeDescription %s " 733 "in schema (%d)\n", 734 bsi->bsi_e->e_name.bv_val, 735 row.col_names[ i ].bv_val, retval ); 736 res = 1; 737 goto done; 738 } 739 740 if ( ad != at->bam_ad ) { 741 Debug( LDAP_DEBUG_ANY, 742 "==>backsql_get_attr_vals(\"%s\"): " 743 "column name %s differs from " 744 "AttributeDescription %s\n", 745 bsi->bsi_e->e_name.bv_val, 746 ad->ad_cname.bv_val, 747 at->bam_ad->ad_cname.bv_val ); 748 res = 1; 749 goto done; 750 } 751#endif /* BACKSQL_TRACE */ 752 753 /* ITS#3386, ITS#3113 - 20070308 754 * If a binary is fetched? 755 * must use the actual size read 756 * from the database. 757 */ 758 if ( BACKSQL_IS_BINARY( row.col_type[ i ] ) ) { 759#ifdef BACKSQL_TRACE 760 Debug( LDAP_DEBUG_ANY, 761 "==>backsql_get_attr_vals(\"%s\"): " 762 "column name %s: data is binary; " 763 "using database size %ld\n", 764 bsi->bsi_e->e_name.bv_val, 765 ad->ad_cname.bv_val, 766 row.value_len[ i ] ); 767#endif /* BACKSQL_TRACE */ 768 bv.bv_val = row.cols[ i ]; 769 bv.bv_len = row.value_len[ i ]; 770 771 } else { 772 ber_str2bv( row.cols[ i ], 0, 0, &bv ); 773 } 774 775#ifdef BACKSQL_PRETTY_VALIDATE 776 if ( pretty ) { 777 struct berval pbv; 778 779 retval = pretty( at->bam_true_ad->ad_type->sat_syntax, 780 &bv, &pbv, bsi->bsi_op->o_tmpmemctx ); 781 bv = pbv; 782 783 } else { 784 retval = validate( at->bam_true_ad->ad_type->sat_syntax, 785 &bv ); 786 } 787 788 if ( retval != LDAP_SUCCESS ) { 789 char buf[ SLAP_TEXT_BUFLEN ]; 790 791 /* FIXME: we're ignoring invalid values, 792 * but we're accepting the attributes; 793 * should we fail at all? */ 794 snprintf( buf, sizeof( buf ), 795 "unable to %s value #%lu " 796 "of AttributeDescription %s", 797 pretty ? "prettify" : "validate", 798 k - oldcount, 799 at->bam_ad->ad_cname.bv_val ); 800 Debug( LDAP_DEBUG_TRACE, 801 "==>backsql_get_attr_vals(\"%s\"): " 802 "%s (%d)\n", 803 bsi->bsi_e->e_name.bv_val, buf, retval ); 804 continue; 805 } 806#endif /* BACKSQL_PRETTY_VALIDATE */ 807 808#ifndef BACKSQL_COUNTQUERY 809 (void)backsql_entry_addattr( bsi->bsi_e, 810 at->bam_true_ad, &bv, 811 bsi->bsi_op->o_tmpmemctx ); 812 813#else /* BACKSQL_COUNTQUERY */ 814 if ( normfunc ) { 815 struct berval nbv; 816 817 retval = (*normfunc)( SLAP_MR_VALUE_OF_ATTRIBUTE_SYNTAX, 818 at->bam_true_ad->ad_type->sat_syntax, 819 at->bam_true_ad->ad_type->sat_equality, 820 &bv, &nbv, 821 bsi->bsi_op->o_tmpmemctx ); 822 823 if ( retval != LDAP_SUCCESS ) { 824 char buf[ SLAP_TEXT_BUFLEN ]; 825 826 /* FIXME: we're ignoring invalid values, 827 * but we're accepting the attributes; 828 * should we fail at all? */ 829 snprintf( buf, sizeof( buf ), 830 "unable to normalize value #%lu " 831 "of AttributeDescription %s", 832 k - oldcount, 833 at->bam_ad->ad_cname.bv_val ); 834 Debug( LDAP_DEBUG_TRACE, 835 "==>backsql_get_attr_vals(\"%s\"): " 836 "%s (%d)\n", 837 bsi->bsi_e->e_name.bv_val, buf, retval ); 838 839#ifdef BACKSQL_PRETTY_VALIDATE 840 if ( pretty ) { 841 bsi->bsi_op->o_tmpfree( bv.bv_val, 842 bsi->bsi_op->o_tmpmemctx ); 843 } 844#endif /* BACKSQL_PRETTY_VALIDATE */ 845 846 continue; 847 } 848 ber_dupbv( &attr->a_nvals[ j ], &nbv ); 849 bsi->bsi_op->o_tmpfree( nbv.bv_val, 850 bsi->bsi_op->o_tmpmemctx ); 851 } 852 853 ber_dupbv( &attr->a_vals[ j ], &bv ); 854 855 assert( j < oldcount + count ); 856 j++; 857#endif /* BACKSQL_COUNTQUERY */ 858 859#ifdef BACKSQL_PRETTY_VALIDATE 860 if ( pretty ) { 861 bsi->bsi_op->o_tmpfree( bv.bv_val, 862 bsi->bsi_op->o_tmpmemctx ); 863 } 864#endif /* BACKSQL_PRETTY_VALIDATE */ 865 866#ifdef BACKSQL_TRACE 867 Debug( LDAP_DEBUG_TRACE, "prec=%d\n", 868 (int)row.col_prec[ i ], 0, 0 ); 869 870 } else { 871 Debug( LDAP_DEBUG_TRACE, "NULL value " 872 "in this row for attribute \"%s\"\n", 873 row.col_names[ i ].bv_val, 0, 0 ); 874#endif /* BACKSQL_TRACE */ 875 } 876 } 877 } 878 879#ifdef BACKSQL_COUNTQUERY 880 if ( BER_BVISNULL( &attr->a_vals[ 0 ] ) ) { 881 /* don't leave around attributes with no values */ 882 attr_free( attr ); 883 884 } else if ( append ) { 885 Attribute **ap; 886 887 for ( ap = &bsi->bsi_e->e_attrs; (*ap) != NULL; ap = &(*ap)->a_next ) 888 /* goto last */ ; 889 *ap = attr; 890 } 891#endif /* BACKSQL_COUNTQUERY */ 892 893 SQLFreeStmt( sth, SQL_DROP ); 894 Debug( LDAP_DEBUG_TRACE, "<==backsql_get_attr_vals()\n", 0, 0, 0 ); 895 896 if ( at->bam_next ) { 897 res = backsql_get_attr_vals( at->bam_next, v_bsi ); 898 } else { 899 res = 1; 900 } 901 902#ifdef BACKSQL_TRACE 903done:; 904#endif /* BACKSQL_TRACE */ 905 backsql_FreeRow_x( &row, bsi->bsi_op->o_tmpmemctx ); 906 907 return res; 908} 909 910int 911backsql_id2entry( backsql_srch_info *bsi, backsql_entryID *eid ) 912{ 913 Operation *op = bsi->bsi_op; 914 backsql_info *bi = (backsql_info *)op->o_bd->be_private; 915 int i; 916 int rc; 917 918 Debug( LDAP_DEBUG_TRACE, "==>backsql_id2entry()\n", 0, 0, 0 ); 919 920 assert( bsi->bsi_e != NULL ); 921 922 memset( bsi->bsi_e, 0, sizeof( Entry ) ); 923 924 if ( bi->sql_baseObject && BACKSQL_IS_BASEOBJECT_ID( &eid->eid_id ) ) { 925 (void)entry_dup2( bsi->bsi_e, bi->sql_baseObject ); 926 goto done; 927 } 928 929 bsi->bsi_e->e_attrs = NULL; 930 bsi->bsi_e->e_private = NULL; 931 932 if ( eid->eid_oc == NULL ) { 933 eid->eid_oc = backsql_id2oc( bsi->bsi_op->o_bd->be_private, 934 eid->eid_oc_id ); 935 if ( eid->eid_oc == NULL ) { 936 Debug( LDAP_DEBUG_TRACE, 937 "backsql_id2entry(): unable to fetch objectClass with id=" BACKSQL_IDNUMFMT " for entry id=" BACKSQL_IDFMT " dn=\"%s\"\n", 938 eid->eid_oc_id, BACKSQL_IDARG(eid->eid_id), 939 eid->eid_dn.bv_val ); 940 return LDAP_OTHER; 941 } 942 } 943 bsi->bsi_oc = eid->eid_oc; 944 bsi->bsi_c_eid = eid; 945 946 ber_dupbv_x( &bsi->bsi_e->e_name, &eid->eid_dn, op->o_tmpmemctx ); 947 ber_dupbv_x( &bsi->bsi_e->e_nname, &eid->eid_ndn, op->o_tmpmemctx ); 948 949#ifndef BACKSQL_ARBITRARY_KEY 950 /* FIXME: unused */ 951 bsi->bsi_e->e_id = eid->eid_id; 952#endif /* ! BACKSQL_ARBITRARY_KEY */ 953 954 rc = attr_merge_normalize_one( bsi->bsi_e, 955 slap_schema.si_ad_objectClass, 956 &bsi->bsi_oc->bom_oc->soc_cname, 957 bsi->bsi_op->o_tmpmemctx ); 958 if ( rc != LDAP_SUCCESS ) { 959 backsql_entry_clean( op, bsi->bsi_e ); 960 return rc; 961 } 962 963 if ( bsi->bsi_attrs == NULL || ( bsi->bsi_flags & BSQL_SF_ALL_USER ) ) 964 { 965 Debug( LDAP_DEBUG_TRACE, "backsql_id2entry(): " 966 "retrieving all attributes\n", 0, 0, 0 ); 967 avl_apply( bsi->bsi_oc->bom_attrs, backsql_get_attr_vals, 968 bsi, 0, AVL_INORDER ); 969 970 } else { 971 Debug( LDAP_DEBUG_TRACE, "backsql_id2entry(): " 972 "custom attribute list\n", 0, 0, 0 ); 973 for ( i = 0; !BER_BVISNULL( &bsi->bsi_attrs[ i ].an_name ); i++ ) { 974 backsql_at_map_rec **vat; 975 AttributeName *an = &bsi->bsi_attrs[ i ]; 976 int j; 977 978 /* if one of the attributes listed here is 979 * a subtype of another, it must be ignored, 980 * because subtypes are already dealt with 981 * by backsql_supad2at() 982 */ 983 for ( j = 0; !BER_BVISNULL( &bsi->bsi_attrs[ j ].an_name ); j++ ) { 984 /* skip self */ 985 if ( j == i ) { 986 continue; 987 } 988 989 /* skip subtypes */ 990 if ( is_at_subtype( an->an_desc->ad_type, 991 bsi->bsi_attrs[ j ].an_desc->ad_type ) ) 992 { 993 goto next; 994 } 995 } 996 997 rc = backsql_supad2at( bsi->bsi_oc, an->an_desc, &vat ); 998 if ( rc != 0 || vat == NULL ) { 999 Debug( LDAP_DEBUG_TRACE, "backsql_id2entry(): " 1000 "attribute \"%s\" is not defined " 1001 "for objectlass \"%s\"\n", 1002 an->an_name.bv_val, 1003 BACKSQL_OC_NAME( bsi->bsi_oc ), 0 ); 1004 continue; 1005 } 1006 1007 for ( j = 0; vat[j]; j++ ) { 1008 backsql_get_attr_vals( vat[j], bsi ); 1009 } 1010 1011 ch_free( vat ); 1012 1013next:; 1014 } 1015 } 1016 1017 if ( bsi->bsi_flags & BSQL_SF_RETURN_ENTRYUUID ) { 1018 Attribute *a_entryUUID, 1019 **ap; 1020 1021 a_entryUUID = backsql_operational_entryUUID( bi, eid ); 1022 if ( a_entryUUID != NULL ) { 1023 for ( ap = &bsi->bsi_e->e_attrs; 1024 *ap; 1025 ap = &(*ap)->a_next ); 1026 1027 *ap = a_entryUUID; 1028 } 1029 } 1030 1031 if ( ( bsi->bsi_flags & BSQL_SF_ALL_OPER ) 1032 || an_find( bsi->bsi_attrs, slap_bv_all_operational_attrs ) 1033 || an_find( bsi->bsi_attrs, &slap_schema.si_ad_structuralObjectClass->ad_cname ) ) 1034 { 1035 ObjectClass *soc = NULL; 1036 1037 if ( BACKSQL_CHECK_SCHEMA( bi ) ) { 1038 Attribute *a; 1039 const char *text = NULL; 1040 char textbuf[ 1024 ]; 1041 size_t textlen = sizeof( textbuf ); 1042 struct berval bv[ 2 ], 1043 *nvals; 1044 int rc = LDAP_SUCCESS; 1045 1046 a = attr_find( bsi->bsi_e->e_attrs, 1047 slap_schema.si_ad_objectClass ); 1048 if ( a != NULL ) { 1049 nvals = a->a_nvals; 1050 1051 } else { 1052 bv[ 0 ] = bsi->bsi_oc->bom_oc->soc_cname; 1053 BER_BVZERO( &bv[ 1 ] ); 1054 nvals = bv; 1055 } 1056 1057 rc = structural_class( nvals, &soc, NULL, 1058 &text, textbuf, textlen, op->o_tmpmemctx ); 1059 if ( rc != LDAP_SUCCESS ) { 1060 Debug( LDAP_DEBUG_TRACE, "backsql_id2entry(%s): " 1061 "structural_class() failed %d (%s)\n", 1062 bsi->bsi_e->e_name.bv_val, 1063 rc, text ? text : "" ); 1064 backsql_entry_clean( op, bsi->bsi_e ); 1065 return rc; 1066 } 1067 1068 if ( !bvmatch( &soc->soc_cname, &bsi->bsi_oc->bom_oc->soc_cname ) ) { 1069 if ( !is_object_subclass( bsi->bsi_oc->bom_oc, soc ) ) { 1070 Debug( LDAP_DEBUG_TRACE, "backsql_id2entry(%s): " 1071 "computed structuralObjectClass %s " 1072 "does not match objectClass %s associated " 1073 "to entry\n", 1074 bsi->bsi_e->e_name.bv_val, soc->soc_cname.bv_val, 1075 bsi->bsi_oc->bom_oc->soc_cname.bv_val ); 1076 backsql_entry_clean( op, bsi->bsi_e ); 1077 return rc; 1078 } 1079 1080 Debug( LDAP_DEBUG_TRACE, "backsql_id2entry(%s): " 1081 "computed structuralObjectClass %s " 1082 "is subclass of objectClass %s associated " 1083 "to entry\n", 1084 bsi->bsi_e->e_name.bv_val, soc->soc_cname.bv_val, 1085 bsi->bsi_oc->bom_oc->soc_cname.bv_val ); 1086 } 1087 1088 } else { 1089 soc = bsi->bsi_oc->bom_oc; 1090 } 1091 1092 rc = attr_merge_normalize_one( bsi->bsi_e, 1093 slap_schema.si_ad_structuralObjectClass, 1094 &soc->soc_cname, 1095 bsi->bsi_op->o_tmpmemctx ); 1096 if ( rc != LDAP_SUCCESS ) { 1097 backsql_entry_clean( op, bsi->bsi_e ); 1098 return rc; 1099 } 1100 } 1101 1102done:; 1103 Debug( LDAP_DEBUG_TRACE, "<==backsql_id2entry()\n", 0, 0, 0 ); 1104 1105 return LDAP_SUCCESS; 1106} 1107 1108